"evaluatorSolution":"The vendor has addressed this issue through a product update which can be found at: http://www.afflib.org/downloads/",
"descriptions":[
{
"lang":"en",
"value":"AFFLIB 2.2.8 and earlier allows attackers to execute arbitrary commands via shell metacharacters involving (1) certain command line parameters in tools/afconvert.cpp and (2) arguments to the get_parameter function in aimage/ident.cpp. NOTE: it is unknown if the get_parameter vector (2) is ever called."
},
{
"lang":"es",
"value":"AFFLIB 2.2.8 y anteriores permite a atacantes remotos ejecutar comandos SQL a trav\u00e9s de un int\u00e9rprete de comandos de metacaracteres que afectan a (1)ciertos par\u00e1metros por linea de comandos en tools/afconvert.cpp y (2) argumentos en la funci\u00f3n get_parameter en aimage/ident.cpp. NOTA: es desconocido si el vector get_parameter (2) se llama siempre."